Dial-up, VPN and Network Devices hacking. Dial-up hacking Phone number footprinting: phone directories (on-line and CD-ROM) Wardialing (scanning): automatically.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Module 5: Configuring Access for Remote Clients and Networks.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Guide to Computer Network Security
COEN 252: Computer Forensics Router Investigation.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Course 201 – Administration, Content Inspection and SSL VPN
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Configuring Routing and Remote Access(RRAS) and Wireless Networking
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Remote Control and Advanced Techniques. Remote Control Software What do they do? Connect through dial-in and/or TCP/IP. Replicate remote screen on local.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 7 Remote Connectivity and VoIP Hacking 1.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Linux Networking and Security
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Remote Connectivity and VoIP Hacking
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CHAPTER 9 Sniffing.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
TCOM Information Assurance Management System Hacking.
Chapter 6 Remote Connectivity and VoIP Hacking Last modified
Footprinting and Scanning
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Virtual Private Networks
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Getting Connected to NGS while on the Road…
Lab #2 NET332 By Asma AlOsaimi.
Click to edit Master subtitle style
Enumeration.
Virtual Private Networks
Microsoft Windows NT 4.0 Authentication Protocols
Footprinting and Scanning
Remote Access Lecture 2.
Remote Control and Advanced Techniques
Footprinting and Scanning
Remote Connectivity and VoIP Hacking
Guide to Computer Network Security
Firewalls Routers, Switches, Hubs VPNs
– Chapter 3 – Device Security (B)
Getting Connected to NGS while on the Road…
Topic 12: Virtual Private Networks
Presentation transcript:

Dial-up, VPN and Network Devices hacking

Dial-up hacking Phone number footprinting: phone directories (on-line and CD-ROM) Wardialing (scanning): automatically dialing a range of numbers, like in telemarketing, using a hardware/software combination. PC with serial ports and modems it is all that is needed Software: ToneLoc, THC-Scan (free) and Phone Sweep (commercial). See book. Typically: one modem can wardial 10,000 numbers in 7 days of 24 hours. Telcos take this seriously and in many areas this is illegal (ping sweep is not). Penetration Domains : once logs are obtained the connections can be classified as (see book for examples in QBASIC): LHF - easily guessed or commonly used passwords for known systems Single authentication, unlimited attempts Single authentication, limited attempts Dual authentication, unlimited attempts Dual authentication, limited attempts Basic countermeasures: Inventory and consolidate modem lines, use at least dual authentication with limited attempts, put in DMZ.

PBX, Voic , VPN PBX: most PBX are no longer electro-mechanic machines, but rather computers with IP numbers, graphical interfaces, etc. Types: Octel, Williams, Meridian, ROLM, ATT -- all with specific ways to login (some very easy to hack, see book). Basic countermeasure: only turn modem on when maintenance is needed, turn off most of the time. Voic low impact, brute force attempts, but no logs (voice answers). VPN: tunneling private data through the Internet with encryption, reducing WAN costs, and supporting modern electronic commerce. VPN Tunneling involves encapsulation of a datagram within another, be it IP within IP (IPSec) or PPP within GRE (PPTP)IPSecPPTP IPSec (replaces PPTP) and Layer 2 Tunneling Protocol - L2TP (replaces L2F) are the most used VPN standards.

VPN Hacking Microsoft PPTP: originally had a weak encryption function, algorithm (RSA), the TCP port (1723) used for connection control was vulnerable to DoS attacks, only the data was encrypted. NT: Service Pack 4 closed these vulnerabilities, Win 9x clients should be upgraded to DUN 1.3 to use these improvements. Win 2k, XP, 7: came with IPSec support as we saw previously. See VPN with Single Sign On in Windows 7. VPN with Single Sign On in Windows 7 IPSec: very difficult to understand, even by experts. Hackers do not seem to have figured it out yet, what is good. Schneier and Ferguson (renowned experts) conclusion: IPSec is too complex to be secure, but it is better than any other security protocol in existence. Schneier and Ferguson Different implementations: VPN requires the use of VPN gateways in the server side. Read this article to see a comparison of these types.this article VOIP hacking: sniffing and enumeration. New tools potential.sniffing and enumerationpotential

Network Devices Detection: use traceroute to find the border router.traceroute Port Scanning: Use Nmap or SuperScan and WUPS to scan TCP and UDP ports. In linux use dig to obtain information: e.g. dig -t mx ubalt.eduNmapSuperScan Routers ports (book page 398). If no ports found means security is in place.ports If you find ports open you may be able to identify the type of device (routers, switches, hubs) and their manufacturers. OS Identification: using Nmap and other tools seen previously. Penetration: Once telnet or shell ports are found we can connect and use the data base of passwords to login if the administrator failed to change the default password, but brute force also can be used.we can connectdata base of passwords SNMP: allow to check status, configuration and change the configuration. You should restrict its use, if allowing it at all through your border router. BackDoors : accounts meant for vendors to enable them to bypass a locked-out administrator, but which offer hackers a back door. Vendors like 3Com,Bay, Cisco, Shiva have created these accounts. Change the defaults!! See also more details in the book, if you manage one of these devices.defaults

Other vulnerabilities Specific vulnerabilities: Cisco and Ascend write MIB. Cisco weak password encryption. TFTP (most routers). Bay config file is clear text.TFTP Shared vs Switched: shared media broadcasts to all nodes. Switched media builds a table of MAC addresses and send the messages to a specific MAC. Use Snmpsniff in Linux to sniff in shared media networks.Snmpsniff Packet sniffing was developed for the shared media environment, but There are now packet-sniffing tools for switches. Dsniff is easily installed in Ubuntu: use sudo apt-get install dsniff. Use sudo to run it. There is a FAQ to help you with its use. See example.now Dsniff FAQ example Basic countermeasure: use encryption in all your traffic, such as PKI (1,2). You can also use VPN to create more secure connections.12 Arp redirect: arp redirect is part of the dsniff package (traffic goes through an attacker machine). RIP spoofing: Again use WUPS or NMAP to scan port 520 (RIP). A C program rprobe was written to demonstrate how to spoof/redirect.WUPS NMAPrprobe